Question about Microsoft Computers & Internet

1 Answer

WE R LOOKING FOR THE ENCRYPTION SOURCE CODE FOR PUBLIC SYSTEM SECURITY. CAN U PLEASE HELP US?

Posted by on

  • Ekse May 11, 2010

    I would also like a ticket to the moon if possible, can you take me to mars?

×

Ad

1 Answer

  • Level 2:

    An expert who has achieved level 2 by getting 100 points

    MVP:

    An expert that gotĀ 5 achievements.

    Sergeant:

    An expert that hasĀ over 500 points.

    Champion:

    An expert who has answered 200 questions.

  • Expert
  • 219 Answers

Go to this site:-
http://www.codeproject.com/KB/security/RSACryptoPad.aspx
u will find the code.
Please rate my solution if problem is solved
Thanks!
Sandy

Posted on May 17, 2009

Ad

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya Technician can help you resolve that issue over the phone in a minute or two.
Best thing about this new service is that you are never placed on hold and get to talk to real repair professionals here in the US.
click here to Talk to a Technician (only for users in the US for now) and get all the help you need.
Goodluck!

Posted on Jan 02, 2017

Ad

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

What does 'SSL communication cannot be performed a handshake error has occurred in SSL' mean?


The Secure Sockets Layer (SSL) protocol uses a combination of public-key and symmetric-key encryption. Symmetric-key encryption is much faster than public-key encryption; however, public-key encryption provides better authentication techniques. An SSL session always begins with an exchange of messages called the SSL handshake. The handshake allows the server to authenticate itself to the client by using public-key techniques, and then allows the client and the server to cooperate in the creation of symmetric keys used for rapid encryption, decryption, and tamper detection during the session that follows. Optionally, the handshake also allows the client to authenticate itself to the server.


If you get the error you can do the following
1. Go to your internet options
2. Go to security settings tab
3. Click on Trusted Site's
4. Add https://THE NAME OF WEBPAGE YOU A GETTING ERROR FROM
5. Go to Advanced tab
6.Scroll down to USE SSL 2.0 and USE SSL.3.0 make they are both selected and click Apply button at the bottom

Apr 21, 2016 | Computers & Internet

Tip

How to protect a mobile app and ensure user data privacy


After Edward Snowden case, the entire world became highly concerned about mobile app security and user data privacy. Especially it concerns mobile messengers with multiple user communications, data views, hacks, and so on.

For example, in 2016 WhatsApp popular messenger decided to fully encrypt the app and provide the complete protection by adding the end-to-end encryption (E2EE).

A bit later Viber also came to E2EE implementation, making it impossible for anyone (including themselves) to even view user information.

End-to-end is the system, in which devices transmit encrypted information to each other without third-party participation. Thus, the communication is direct, there are no intermediaries, and all the information, involving messages, calls, images, and video, is completely encrypted. Only those users who participate in the chat (one-to-one chats, group chats) will be able to read the messages.

It is based on public key encryption, working based on two keys - public and private. The first key (public) is used for encrypting messages and the second (private) - for their decryption.

An advantage is that a public key can be freely distributed, so everyone to whom a user gives your public key, can send an encrypted message. And since only he / she has a private key, only he / she can decrypt a message.

Find out more about E2EE and the ways to successfully encrypt a mobile app.


Whatsapp adds end to end encryption
Viber adds end to end encryption and hidden chats as messaging app privacy... Mobile app security Using end2end encryption for protecting mobile...

on Nov 06, 2017 | MoonBeam Development Android Apps

1 Answer

No data internet connection


Connecting to the Internet without a Wi-Fi data plan isn't a difficult process even for a novice at utilizing and joining wireless networks. Whether you are looking to join a public Wi-Fi hotspot network or a neighbor's private Wi-Fi network with their permission, get your computer online and browsing the Internet without the use of your own Wi-Fi data plan, saving money in the process. Note these steps to get you connected in just a few minutes.

Move to an area that offers free public Wi-Fi or to an area where you believe you are close enough to pick up a neighbor's Wi-Fi signal. In the latter case, check with your neighbor beforehand to ensure it is allowed that you utilize their Wi-Fi network. Using a private network without permission is illegal. Boot up your laptop. Allow Windows or the Mac operating system to load up fully on the laptop. Click on the wireless icon on your computer's desktop area. In Windows, you will find this icon on the right side of the bottom toolbar. It appears to be a computer monitor icon with small radio waves reaching out of it. Alternatively, on a Mac laptop click on the Wi-Fi icon on the top right toolbar in the desktop area. This icon will look like a set of radio waves extending upward. Look over the list that appears once you click on the wireless icon. This list will present all the wireless network options that are within the range of your laptop. Avoid any that present with a "lock" icon beside them, because these require passwords. If you are looking to join a password-protected network like one offered by a neighbor, request the password ahead of time. In the event of a public network at a local business, a password will not be required. Click on the network you intend to join. Input the appropriate password at this point, if joining a password-protected network. Also, choose the type of security encryption the private Wi-Fi network is using. Your computer will often have this auto-selected, but you may need to select either "WPA" or "WEP" security manually. Click "Enter" on your keyboard. If you do not have the necessary password or are unsure as to the security encryption type, either contact the network administer or click "Cancel" and join a public Wi-Fi network. Allow several moments for your computer to join the network. You will receive a notification on your Windows or Mac toolbar when it does. Launch your Internet browser of choice and begin utilizing the Internet without having to rely on your own Wi-Fi data plan

Jan 30, 2013 | Computers & Internet

1 Answer

I have encrypted my local disk using bitlocker encryption and now it shows Local Disk(D:) is not accessible Access is denied and when i right click it was not showing security tab. please help me


Try This:

Before you start
  • You must be logged on as an administrator.

  • The volume must be encrypted.

To turn off BitLocker Drive Encryption
  1. Click Start, click Control Panel, click Security, and then click BitLocker Drive Encryption.
  2. From the BitLocker Drive Encryption page, find the volume on which you want BitLocker Drive Encryption turned off, and click Turn Off BitLocker Drive Encryption.
  3. From the What level of decryption do you want dialog box, click either Disable BitLocker Drive Encryption or Decrypt the volume as needed.
    By completing this procedure, you have either disabled BitLocker or decrypted the operating system volume.



    Good Luck!!

Aug 16, 2012 | HP Computers & Internet

1 Answer

I'm currently trying to connect my DS Lite to my home network. The router I'm trying to connect it to is a MAC router, and when I search for an access point, my DS does pick up that my router is there-...


The DS does not support the WPA encryption scheme; which is the only secure encryption scheme available. You could temporarily degrade the security in the router's admin page to WEP, though I would recommend you use public wifi when you have to, and keep yours secure.

Mar 10, 2011 | Nintendo DS Lite Console

1 Answer

I am looking for a motion recognition system with source code. If anyone can help me


Hi,
Here are a few links to get you started:
Video Motion Detection
iSpy
Home surveillance security system
Open Source C# Surveillance Software and Motion Detection

To get more detailed help, please include:
1. The device that you will use for motion detection, e.g webcam, infra-red sensors etc
2. The programming language that you want the source code. Alternatively, you can extract the algorithm from one language and re-write it into your programming language of choice.

Best Wishes.

Mar 06, 2011 | Computers & Internet

1 Answer

I can get to the login page but I need to set my username and password since I am using an internet connection at a golf community and want to secure my computer. Can you help. shillgolf@gmail.com


To log in a public WIFI you don,t need to log in,since is a public domain.The only thing you need is to secure your connection with :

Here are four quick tips to enjoy the convenience of public Wi-Fi and help to protect your privacy.
1. Use a firewall If your computer uses Windows Vista or Windows XP and you've installed Service Pack 2, you have a built-in firewall that's turned on by default.
You can configure Windows Firewall to provide better protection when you're using a public wireless network.
For more information, see Windows Firewall.
2. Hide your files When you use public Wi-Fi, network encryption is often out of your control.
Check the privacy statement on the network's Web site to learn about the type of encryption they use. (If they don't have a privacy statement, you'd be better off not using the network.)
If you keep personal or financial information on your computer, consider investing in an operating system, such as Windows Vista, that includes the tools to protect your information through encryption.
To learn more, see Encrypt or decrypt a folder or file.
3. Don't type in credit card numbers or passwords These measures provide some protection against casual hackers and identity thieves who prey on wireless networks. But if criminals are determined enough, they will eventually find a way to get around any security system.
If you want to be safe, avoid typing any sensitive information, such as your credit card number or any other financial information, while you use a public wireless network.
icotip.gif Tip: If you must enter credit card numbers while using a public wireless network, make sure there is a locked padlock icon at the bottom right corner of the browser window, and make sure the Web address begins with https: (the "s" stands for secure).
4. Turn off your wireless network when you're not using it If you're not surfing the Internet or sending e-mail, but still using your computer in an area where there is a public wireless network, disable your wireless connection.
If you're using an external Wi-Fi card you can remove it.
If you're using an internal WiFi card, right-click the connection and click Disable.

Nov 09, 2010 | D-Link RangeBooster G WBR-2310 Wireless...

4 Answers

Java is not working


Hello there :
first you are going to want to ensure that your your current version of java is installed correctly and is not corrupted and if it needs to be reinstalled
download the latest java version and reinstall this . www.java.com
this should be able to take care of the problem that you are having ok?
best regards michael

Aug 23, 2009 | ArcMedia JavaScript Source Code 3000 Pro...

1 Answer

Source code of a program


import java.util.*;
public class StringReverse {
  public static void main(String[] argv) {
    //+
    String s = "Support Tech Problem";

    // Put it in the stack frontwards
    Stack myStack = new Stack();
    StringTokenizer st = new StringTokenizer(s);
    while (st.hasMoreTokens()) myStack.push(st.nextElement());

    // Print the stack backwards
    System.out.print('"' + s + '"' + " backwards by word is:\n\t\"");
    while (!myStack.empty()) { 
      System.out.print(myStack.pop());
      System.out.print(' ');
    }
    System.out.println('"');
    //-
  }
}

Apr 07, 2009 | ArcMedia JavaScript Source Code 3000 Pro...

1 Answer

Java source code for MPEG-4 H-264


hai solve the problem. the problem is i am doing project in proxy services. the problem is i need services like encryption,decryption and compress video.. i want source code for that

Mar 25, 2009 | Opcode Wiley H.264 and MPEG-4 Video...

Not finding what you are looking for?
Computers & Internet Logo

Related Topics:

73 people viewed this question

Ask a Question

Usually answered in minutes!

Top Microsoft Computers & Internet Experts

micky dee

Level 3 Expert

2912 Answers

Piyal Perera
Piyal Perera

Level 3 Expert

528 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18411 Answers

Are you a Microsoft Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...